Your SlideShare is downloading. ×
Out of Control? Managing our digital reputations
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Out of Control? Managing our digital reputations


Published on

Talk given at the Evolve/Educamp ORT'09, 16 February 2009. See …

Talk given at the Evolve/Educamp ORT'09, 16 February 2009. See

Published in: Education, Technology, Business

  • Be the first to comment

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

No notes for slide


  • 1. out of control? m anaging our digital reputations Dr Steven Warburton, King’s College London ORT’09 16 February 2009
  • 2. “ As I try (and leave) more and more environments I am depositing small identity artifacts that I can no longer track and I am feeling like I am fracturing my identity more and more along the way.” Cole Camplese
  • 3. context
    • digital identity – what is it and why is it important?
    • can we control effectively facets of our digital identity?
  • 4. digital ID and LLL
    • Statement 1: One of the cornerstones for individuals wanting to build sustainable lifelong learning strategies (including movement within the workplace) has been (the promise of) the ability to build an effective online identity.
    • One that acts as a node or central place for building a digital persona and aggregating digital traces allowing one to present oneself effectively to transitions both educational and employment related.
  • 5. digital ID and social media
    • Statement 2: Fundamental changes in our relationship with the Internet have been driven by new social software tools and services and lowered barriers to connectivity.
    • This democratisation of electronic content production means that individuals can now publish, comment on and tag material at negligible cost.
  • 6. digital ID and visibility
    • Statement 3: The effect has been to massively increase the visibility of digital identities and shift their construction outside of the control of any one person. Identity has become not only (1) what one says about oneself , but also (2) all that is said about one by others and (3) ones activity in any electronic exchange with both human and with intelligent agents .
    • Today it is virtually impossible to remain at the margins of digital life and the production of an online identity.
  • 7. the complexity of identity
    • self as internal
    • self as viewed by others
    • the self in relation to knowledge and discourse
    • the self as a body
    • what does this self look like - a concept, a story, an image or an associative network or community?
    • ‘ digital identity’ … a technologically mediated instantiation of the self and can be formed from any available electronic data that references ‘you’
  • 8. scope ID, fixed digital self, mutable Digital identity landscape: what are online identities and how are they implemented? Identity literacies and competencies: How do we create online identities and the rhetoric of the self? Functional identities in use: Online identities, what for? What is the spectrum of identity related transactions (LLL)? Interactions between live identities: How identities interact? Social, ethical and security dimensions themes 1 to 4 (below)
  • 9. performance
  • 10. digital identities
    • digital identities are performed across a variety of electronic spaces – leveraging a number of differing services and comprise both structured and unstructured data transactions
    • often resulting in the creation of distributed, proliferating digital selves
    • there is no ‘single view’, only multiple partial perspectives
    • we cannot always control the context
    • we have become curators of the self
    • often performing for an unknown audience and unable to separate the ‘front-stage’ from the ‘back-stage’
  • 11. re-performance
  • 12.  
  • 13.  
  • 14.  
  • 15.
  • 16. “ Bon annniversaire, Marc. Le 5 décembre 2008, tu fêteras tes vingt-neuf ans. Tu permets qu’on se tutoie, Marc ? Tu ne me connais pas, c’est vrai. Mais moi, je te connais très bien. C’est sur toi qu’est tombée la (mal)chance d’être le premier portrait Google du Tigre. Une rubrique toute simple : on prend un anonyme et on raconte sa vie grâce à toutes les traces qu’il a laissées, volontairement ou non sur Internet. Comment ça, un message se cache derrière l’idée de cette rubrique? Évidemment: l’idée qu’on ne fait pas vraiment attention aux informations privées disponibles sur Internet, et que, une fois synthétisées, elles prennent soudain un relief inquiétant … Mais c’est pour la bonne cause; et puis, après tout, c’est de ta faute tu n’avais qu’à faire attention.” Happy Birthday Marc. On the 5 th December 2008 you will be 29. Do you mind if I call you Marc? You don’t know me, that’s true. But me, I know you very well. It falls on you the (bad)luck of being the first ‘Tigre’ Google portrait. It is a simple rubric: find an anonymous person and tell the story of their life using all the traces they have left voluntarily, or not, on the internet. … But it is for a good cause; and anyway, after all, it is your fault: all you had to do was pay attention.
  • 17. the role of identity in career progression
  • 18. job search: diversification
    • active job searching – matching profile to role specification
    • social networking – leveraging social spaces
    • ego-branding – using personal technologies
    Source: Kite project report 2008
  • 19. Big companies understand the importance of brands. Today, in the Age of the Individual, you have to be your own brand … the CEO of Me Inc. The brand called you
  • 20. a level playing field? Problem 1: not everyone has the necessary set of skills to brand themselves effectively. Problem 2: profiles can be mashed up and re-aggregated by ‘others’ cf. ‘re-performance’
  • 21. fighting for control
    • digital literacy
    • e-Portfolio tools
    • Personal Learning Environment
    • personal aggregators (e.g. Netvibes)
    • leverage professional networking services e.g. LinkedIn
    • create authoritative sources e.g ClaimID
    • deploy reputation management tools e.g. naymz, iKarma, opinity
    • standardised format e.g curriculum vitae
  • 22. a proof of concept identity may not be a CV and a CV is not online identity BUT it is a key component in identity transactions related to education and work addresses control, management and user-centric* presentation of the self background of increasing use of blogs, plug-ins, widgets *this is an approach also adopted by the ‘H-Resume’ project
  • 23. a user-centric model
    • own space to hold CV; control of personal data
    • user can customise presentation and create different views on the data sensitive to the target audience
    • fully compliant with HR-XML staffing exchange standards
    • export in multiple formats (xhtml, pdf, odt, doc)
    • one to many publishing model
    • links to a blog and evidence of performance
    • can be widgetised and communicate with professional networking service e.g. LinkedIn
    • Controlling the contextual overlaps.
    • Maintain coherent selves for appropriate audiences.
    • Developing both social and technical solutions.
    Digital Identities What I say about myself. What others say about me. The interactions of my digital data with machines. Informal Formal
  • 25. participate: resources, events and information Steven Warburton Margarita Perez-Garcia Graham Attwell